Showing posts from December, 2018

How PUBG Mobile hacks works? Is hacking APK legal?

PUBG Mobile hacking, this might sound fascinating for some people but in actual reality how much potential this term has? Let’s find out here.
As we all know that every lock has its own respective key, which can’t be open without it. But we should never forget that for every lock there is also a master key. Similarly, the proverb where there’s a will there’s a way fits perfectly in here as you are about to witness some shocking realities regarding Android game hacking. The most Demanding and Dominating game PUBG is in news again. This game has now earned a serious reputation among gamers. The PlayerUnknown’s Battleground (PUBG), is one of the most popular games on the internet today. But is it really possible to hack this masterpiece? Let’s find out.

Remote Password cracking with Brutus : the Script Kiddie’s Way

Hi everybody, today I’m gonna show you remote password cracking with Brutus. For the newbies, script kiddie is a person with little knowledge  of hacking or any programming languages and instead searches for automatic tools to hack the computers. In this scenario, script kiddie is using a Windows XP machine and two tools Zenmap and Brutus avilable for free to download. As you will see, Zenmap is used for scanning for any open ports of  live machines and Brutus is a password cracker. Imagine I am the script kiddie, I  first find out my own computer’s  ip address by typing the command ipconfig in the command line. The ip address of my system happens to be I decide to scan the following range of ip addresses to look for any live hosts. In the target option, I specify ip address as and I choose profile as intense scan to get maximum information about the target. After performing the scan, the results show that only one system is alive. The scan  als…

Setup a virtual pen testing lab:Step-by-Step guide

Virtual penetration testing lab is a lab created on a single system using any virtualization software. It can be very helpful for people practising for CEH or similar certification. Any penetration testing lab has two machines, attacker and victim. In this lab we will set up Kali Linux as the attacker and Windows XP( most favourite victim machine ) as the victim. I am going to set up this lab in Vmware Workstation 9. Hope this will be helpful. First of all install Kali Linux and Windows XP in Vmware Workstation.
Shut them down. In the Vmware Workstation menu, SelectEdit”and click on Virtual Network editor. The window below will open showing the virtual network adapters. Click on “Add network”.

Target Specification in Nmap.

Nmap is a popular port scanner. Today we are going to see target specification in nmap. In Nmap target can be specified in six different ways. We are going to look at each one of them. For this, I am using Kali Linux connected internally with IP address 1. nmap -iL <input filename> This option reads targets from a specific file. Let’s create a file named alpha with a few   newline separated or tab-limited or space separated IP addresses using vi on Desktop.
Then, move to Desktop directory and type the command nmap -iL alphaas shown below. It scans the four IP addresses listed in our file. 2. nmap -iR <number of hosts> This option is used to specify random hosts to scan. Nmap generates its own targets to scan. The<number of hosts> argument tells nmap the number of IP’s to generate. Let’s type command “nmap -iR 5″. We can see that nmap generated five random targets to scan. The scan failed to determine route to the generated IP addresses because my system i…

Upgrade command shell to Meterpreter session

Hello friends.. I took a long break from the blog (actually I was channeling my energy on my monthly magazine Hacker Computer School). But I am here now back with a bang or should I say hack. Ok, Most of the times we only get a command shell on our target while hacking, although we wish we got a meterpreter session (like the casehere). Today we will see how to upgrade the command shell to meterpreter. First thing we need is to background the current command shell session. Hit on CTRL+C. Don’t abort the session altogether. If it happened by mistake ( like it happened to me below), select “no” when it asks whether to abort a session. Then hit CTRL+Z and select Yes. Your session has been sent to background. Remember the session number. Load the command shell to meterpreter upgrade module. We need only one option, the session id we sent to background. Specify the session id and run the exploit as shown below. We will get the meterpreter session. Type command “sessions -l” to see all our …